2019
DOI: 10.1109/access.2019.2937917
|View full text |Cite
|
Sign up to set email alerts
|

A Key Protection Scheme Based on Secret Sharing for Blockchain-Based Construction Supply Chain System

Abstract: Traditional construction supply chains suffer from extra delays, costs and information wastages due to information intermediaries. Blockchain, a decentralized infrastructure, can provide irreversibility, undeniableness, uniqueness and anonymity for trades. Hence, we first propose a blockchain-based construction supply chain framework to reduce limitations in traditional ones. However, payment security by blockchain must be guaranteed and token assets in accounts must be protected. Although the loss of private … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(35 citation statements)
references
References 18 publications
0
30
0
Order By: Relevance
“…Traceability [58] and transparency [59] issues are increasingly drawing more attention, and this phenomenon explains the penetration point where blockchain could be applied in SCM. We also found early evidence that these applications may cover various sectors such as the chemical [60], construction [61], [62], airline [63]- [65], and manufacturing [66], [67].…”
Section: B Classification Of Selected Papersmentioning
confidence: 54%
“…Traceability [58] and transparency [59] issues are increasingly drawing more attention, and this phenomenon explains the penetration point where blockchain could be applied in SCM. We also found early evidence that these applications may cover various sectors such as the chemical [60], construction [61], [62], airline [63]- [65], and manufacturing [66], [67].…”
Section: B Classification Of Selected Papersmentioning
confidence: 54%
“…Table 1 explains the functions that were used to implement the algorithms discussed earlier. The developed smart contract can be found in the GitHub repository 1 . Furthermore, these functions are illustrated as a series of functions and events in a sequence diagram, as shown in Fig.…”
Section: Methodsmentioning
confidence: 99%
“…In this section, we discuss key properties of the proposed blockchain VMI solution in addressing major security and privacy concerns that include data integrity, authenticity, availability, accountability, and scalability. In addition, we will consider the robustness of the system against popular cyberattacks such as DDoS attacks [1,33].…”
Section: B Security and Privacy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…It consists in dividing a piece of sensitive information into multiple parts that are distributed among diverse participants and which can be reconstructed by using a minimum number of parts [238]. For instance, in [8] it is introduced a private-key distribution method to help recover lost private keys that is based in secret sharing and in network protocols that guarantee the security of secret share transmission. Another example can be found in [239], where the authors use secret sharing to distribute transaction data securely among peers in a blockchain.…”
Section: Key Findingsmentioning
confidence: 99%